traducido por Federico Dilla
CryptoLocker is Trojan that targets computers using the Windows operating system, is a criminal practice that became popular in 2013, was strengthened during 2014 and promises to continue growing in 2015
CryptoLocker a simple and effective Trojan for cybercrime
by admin • December 15, 2014
Yago Gómez Trenor - Security Analyst Vintegris
Yago Gómez Trenor - Security Analyst Vintegris
CryptoLocker is Trojan that targets computers using the Windows operating system, is a criminal practice that became popular in 2013, was strengthened during 2014 and promises to continue to grow during 2015.
CryptoLocker spreads in various ways, the higher permeability uses an attachment in an email.
Once the user falls into the trap and the Trojan is activated, the malware figure certain types of files stored on local disks and network drives using public key cryptography, hiding the private key on the servers of malware.
Once the encryption, displays a message on screen that configures the criminal extortion, which promises to decrypt the files affected, if a rescue is done before a deadline (usually using Bitcoins). To add more pressure and drama on the unsuspecting user mentioned that the private key will be permanently deleted from the server, which will be impossible to recover after the deadline.
As in any extortion, there is always second choices, the malware has the ability to decrypt the data through an online service associated with malware operators, for a price much higher Bitcoin.
While the malware can be removed without major problems, the files remain encrypted, and private key is almost impossible to decipher.
Recommendations to avoid CryptoLocker
Take extra precautions against unsolicited emails from senders mainly for those that include attachments or links to external files.
Disable Windows policy that hides known extensions, this will help to recognize an attack of this type.
Use your regular backup system basically your critical files. Format c: // (reformat your computer) is usually the least expensive option when you have a backup.
If you do not have a backup and has been infected, consider dealing with criminals, nothing ensures you will not be attacked again in the future by the same offender and if you contribute to profitability paga- a system of criminal extortion. Undoubtedly, NO PAY always be a lower cost.
CryptoLocker es troyano que apunta a equipos que utilizan el sistema operativo Windows, es una práctica delictiva que se popularizó en 2013, se afianzó durante 2014 y promete seguir creciendo durante 2015